首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
申静 《液晶与显示》2018,33(6):511-519
利用人眼对比敏感度视觉特性和图像的纹理特征,提出了一种彩色图像的水印算法。算法首先依据图像的纹理特征,将图像进行分割;再将水印嵌入到图像纹理复杂的部分,并利用人眼对比敏感阈值控制水印的嵌入量,从而实现水印的嵌入;最后利用逆过程实现水印的提取。同时对3幅不同复杂纹理的图像进行仿真实验,并对3幅含水印图进行5种方式的攻击测试,且与近些年国内外报道的8种水印算法进行对比分析。结果表明,在中间剪切1/4区域、质量因子为20%的压缩和旋转90°较强的攻击下,提取水印的NC值和含水印图的SSIM值均仍能达到0.8以上,且比8种水印算法具有更好的鲁棒性。综合结果表明,在水印嵌入过程中,提出的算法能够有效解决水印容量与视觉透明性、鲁棒性之间的平衡,是一种行之有效的图像水印算法。  相似文献   

2.
根据HVS系统,人眼对于红、绿、蓝三色的敏感程度是不同的。人眼对于蓝色分量最不敏感,故嵌入水印有良好的透明性,但同时在红色分量中嵌入水印具有良好的鲁棒性。为解决水印嵌入的视觉失真问题,采用了不同基色对应不同的加权系数的水印嵌入方案。同时,将彩色水印图像嵌入彩色宿主图像的中频段以及多次嵌入低频段来增加算法的鲁棒性。仿真结果表明,该算法具有较好的透明性,且提取水印效果较好。  相似文献   

3.
Watermarking techniques are primarily used for copyright protection. A simple and robust watermark-like digital authentication scheme is proposed. This work has two major merits. First, the watermark used in the proposed authentication scheme is the same type used in the original image, e.g. grey level images. Second, the proposed scheme meets the requirements for watermarking techniques. Illegal users cannot perceive and break the watermark signed from the original image. Furthermore, the signed watermark is robust against attacks by many image altering algorithms, such as filtering, lossy compression, rotation and scaling. The proposed scheme is not only suitable for ordinary natural images, but also for cartoon graphics  相似文献   

4.
Currently, digital mobile devices, especially smartphones, can be used to acquire information conveniently through photograph taking. To protect information security in this case, we propose an efficient screen-shooting resistant watermarking scheme via deep neural network (DNN) in the frequency domain to achieve additional information embedding and source tracing. Specifically, we enhance the imperceptibility of watermarked images and the robustness against various attacks in real scene by computing the residual watermark message and encoding it with the original image using a lightweight neural network in the DCT domain. In addition, a noise layer is designed to simulate the photometric and radiometric effects of screen-shooting transfer. During the training process, the enhancing network is used to highlight the coding features of distorted images and improve the accuracy of extracted watermark message. Experimental results demonstrate that our scheme not only effectively ensures the balance between the imperceptibility of watermark embedding and the robustness of watermark extraction, but also significantly improves computational efficiency compared with some state-of-the-art schemes.  相似文献   

5.
抵抗几何攻击的数字图像水印   总被引:8,自引:1,他引:7  
桑茂栋  赵耀 《电子与信息学报》2004,26(12):1875-1881
该文实现了一种抵抗几何攻击的数字图像水印方案。水印信号为根据密钥产生的服从正态分布的实数序列,对水印信号作预处理并进行周期化之后在空域将其嵌入数字图像中。检测端不需要原始图像,根据预测水印的自相关函数(ACF)判断水印图像遭受的几何变换攻击并进行逆变换,然后进行水印检测。实验表明该方案对压缩、滤波、剪切等常见的图像处理攻击同样具有很高的鲁棒性。  相似文献   

6.
Watermark robustness to geometric attacks is still a challenging research field. In this paper, a novel robust image watermarking scheme is proposed for resisting such attacks. Watermark synchronization is first achieved by local invariant regions which can be generated using scale normalization and image feature points. The watermark is embedded into all the local regions repeatedly in spatial domain. During embedding, each circular region is first divided into homocentric cirque regions. Then the watermark bits are embedded by quantizing each cirque region into an “odd” or “even” region using odd–even quantization. In the decoder, an odd–even detector (OED) is designed to extract the watermark from the distorted image directly. Localized embedding achieves good invisibility and repeated insertion enhances watermark robustness. Simulation results show that the proposed scheme is robust to both geometric attacks and traditional signal processing attacks.  相似文献   

7.
为了增强水印的抗几何攻击能力,提出了一种基于归一化和Bessel-Fourier矩的鲁棒水印算法。首先对图像进行归一化,使图像的Bessel-Fourier矩具有旋转、缩放和平移(RST)不变性;然后通过使用Bessel-Fourier多项式直接将水印添加到图像的空域强度中,嵌入强度由一个迭代特征修改和验证程序控制,可以避免在水印嵌入和检测过程中引入错误。大量的实验结果表明,本文提出的水印算法对几何攻击以及一般的信号处理具有很好的鲁棒性。  相似文献   

8.
基于几何矩的抵抗RST攻击的数字图像水印   总被引:8,自引:0,他引:8  
目前大多数的数字图像水印方案不能有效抵抗几何形变的攻击,这一弱点已成为数字水印技术走上商用的瓶颈。在各种几何形变中,RST(旋转、缩放、平移)是最为常见的攻击方式。该文提出了一种具有普适性的能够抵抗RST攻击的多比特数字图像水印方案,采用的主要措施有:(1)提出一种基于几何矩的图像标准化方案以抵抗几何攻击;(2)采用扩谱方法构造二维CDMA水印信号,实现多比特水印嵌入;(3)根据HVS特性自适应调整水印的嵌入强度,在鲁棒性和不可见性之间达到平衡;(4)利用MAP和相关方法估计和检测水印信号。实验表明该方案对RST具有很高的鲁棒性,对压缩、滤波等常见的图像处理攻击同样具有良好的鲁棒性。  相似文献   

9.
Digital watermarking robust to geometric distortions.   总被引:23,自引:0,他引:23  
In this paper, we present two watermarking approaches that are robust to geometric distortions. The first approach is based on image normalization, in which both watermark embedding and extraction are carried out with respect to an image normalized to meet a set of predefined moment criteria. We propose a new normalization procedure, which is invariant to affine transform attacks. The resulting watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. The second approach is based on a watermark resynchronization scheme aimed to alleviate the effects of random bending attacks. In this scheme, a deformable mesh is used to correct the distortion caused by the attack. The watermark is then extracted from the corrected image. In contrast to the first scheme, the latter is suitable for private watermarking applications, where the original image is necessary for watermark detection. In both schemes, we employ a direct-sequence code division multiple access approach to embed a multibit watermark in the discrete cosine transform domain of the image. Numerical experiments demonstrate that the proposed watermarking schemes are robust to a wide range of geometric attacks.  相似文献   

10.
基于伪Zernike矩的抗几何攻击图像水印   总被引:1,自引:5,他引:1  
针对几何攻击容易使常规水印算法检测失败的问题,利用图像伪Zernike矩的幅度具有旋转不变的性质,提出了一种抗几何攻击图像水印算法(GWPZM).首先计算图像的伪Zernike矩,选择适宜于嵌入水印的矩进行幅度改变量测试.筛选出最优矩集合,根据水印比特自适应地修改集合中的矩,并对差矢量进行伪Zernike矩重构,通过将重构图像在空域迭加到原始图像中嵌入水印.水印检测时,首先计算受攻击图像的伪Zernike矩,以最优矩集合作为密钥,通过与原始图像比较矩的幅度提取水印.实验结果表明,GWPZM算法能够抵抗旋转、缩放攻击、二者组合攻击以及JPEG压缩、噪声等常规攻击.  相似文献   

11.
A blind digital image watermarking scheme based on spatial domain is presented and investigated in this paper. The watermark has been embedded in intermediate significant bit planes besides the least significant bit plane at the address locations determined by pseudorandom address vector (PAV). The watermark embedding using PAV makes it difficult for an adversary to locate the watermark and hence adds to security of the system. The scheme has been evaluated to ascertain the spatial locations that are robust to various image processing and geometric attacks JPEG compression, additive white Gaussian noise, salt and pepper noise, filtering and rotation. The experimental results obtained, reveal an interesting fact, that, for all the above mentioned attacks, other than rotation, higher the bit plane in which watermark is embedded more robust the system. Further, the perceptual quality of the watermarked images obtained in the proposed system has been compared with some state-of-art watermarking techniques. The proposed technique outperforms the techniques under comparison, even if compared with the worst case peak signal-to-noise ratio obtained in our scheme.  相似文献   

12.
In this paper, a new watermarking scheme based on Human Visual System (HVS) modeling is proposed. The approach consists in building computational models which take into account the most common properties of the HVS that can be exploited for watermarking. Two schemes for embedding and controlling the transparency of the watermark are presented, namely the implicit and the explicit schemes. Both schemes are designed in the framework of the pyramidal decomposition which has been shown to be a powerful tool for analyzing image through a multi-scale representation. For the first approach, a multi-scale visibility map is used to optimize the watermark embedding process. The second approach makes use of HVS properties in an explicit and more sophisticated manner that consists in tuning the watermark strength just beneath the visual detection threshold. A new JND (Just-Noticeable-Difference) model for determining this threshold is then proposed and evaluated. The obtained results provide a strong support for this new JND model.  相似文献   

13.
基于正交扩频码和HVS的DCT域图像数字水印技术   总被引:2,自引:1,他引:1  
文章基于对数字水印通信模型与通信系统相似性的分析,提出了一种利用正交扩频码构造多个独立信道对同一水印进行重复正交嵌入的想法,并引入HVS模型,把图像分块在DCT域分成三类,然后采用不同的嵌入强度系数嵌入到DCT中频系数中,最后从多个独立信道分别提取水印并做合成。实验结果表明,该方案较一般的扩频水印方法对高斯噪声、JPEG压缩、剪切和中值滤波具有更好的鲁棒性。  相似文献   

14.
A watermarking scheme designed for remote sensing images needs to meet the same demand of both invisibility as for ordinary digital images.Due to specific perceptual characteristics of Synthetic Aperture Radar (SAR) images,the watermarking algorithms with consideration of Human Vision System (HVS) modeling from optical images give poor performance when applied on SAR images.This paper examines a variety of factors affecting the noise sensitivity,and further proposes a refined pixel-wise masking approach for watermarking on SAR images.The proposed approach is applied on logarithmic transformed SAR images,and has increased the acceptable watermark embedding strength by about 6 dB to 10 dB while achieving the same levels of watermarked image visual quality.Experimental results show that this approach enhanced the perceptual invisibility of watermarking based on wavelet decomposition.  相似文献   

15.
A new blind digital image watermarking algorithm with watermark embedded in discrete cosine transform (DCT) coefficients is presented in this paper. The proposed scheme exploits correlation between DCT coefficients in neighborhood blocks for embedding. The watermark is embedded by modifying two DCT coefficients, one pertaining to a block in which watermark bit (0 or 1) is to be embedded and the other corresponding to the selected neighborhood block. Both the selected coefficients are modified by a modification factor so that the difference between the pair of coefficients is brought to a predefined zone. This difference between two DCT coefficients is used to extract watermark. The proposed technique has been tested for different attacks like JPEG compression, rotation, cropping, filtering, gaussian noise, salt and pepper noise, histogram equalization etc. It has been observed that the scheme is highly robust not only for the above mentioned attacks used singularly, but also for different possible combinations of simultaneous attacks. A comparison of the proposed technique with some state of art existing algorithms reveals that our scheme provides better results in terms of quality of watermarked images, payload and robustness.  相似文献   

16.
提出一种基于小波域图像纹理特征的彩色图像盲水印算法。该算法根据。图像小波变换后小波系数的特点选择视觉重要系数,量化嵌入二值水印序列。利用人类视觉系统的纹理掩蔽特性和照度掩蔽特性自适应调整量化间距,以保证水印的透明性。算法实现了水印的盲检测。仿真实验的结果表明,算法对各种常用的水印攻击方法具有较好的鲁棒性。  相似文献   

17.
The homomorphic cryptosystems create a great opportunity for secure signal processing (SSP). Watermarking in the encrypted domain provides a promising solution to the security of watermarking. However, the robust performance of the watermarking scheme in the encrypted domain should be carefully considered. In this paper, we propose a robust watermarking scheme in the encrypted domain, which protects the original images from the third party embedders. The hybrid discrete wavelet transform (DWT) and discrete cosine transform (DCT) based method improves the robust performance of the encrypted domain watermarking scheme. The watermark extraction can be performed on both the plaintext and the encrypted domains. We also give an estimation of the expanding factor after watermark embedding in the encrypted domain. At last, we discuss the watermark attacks that are available in the encrypted domain. Taking Haar wavelet transform for example, we conduct the experiments on the visual quality and the robustness of our watermarking scheme, which demonstrate that the entire performance is satisfactory.  相似文献   

18.
We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.  相似文献   

19.
《Signal processing》2007,87(6):1363-1383
A tremendous amount of digital multimedia data is broadcasted daily over the internet. Since digital data can be very quickly and easily duplicated, intellectual property right protection techniques have become important and first appeared about fifty years ago (see [I.J. Cox, M.L. Miller, The First 50 Years of Electronic Watermarking, EURASIP J. Appl. Signal Process. 2 (2002) 126–132. [52]] for an extended review). Digital watermarking was born. Since its inception, many watermarking techniques have appeared, in all possible transformed spaces. However, an important lack in watermarking literature concerns the human visual system models. Several human visual system (HVS) model based watermarking techniques were designed in the late 1990's. Due to the weak robustness results, especially concerning geometrical distortions, the interest in such studies has reduced. In this paper, we intend to take advantage of recent advances in HVS models and watermarking techniques to revisit this issue. We will demonstrate that it is possible to resist too many attacks, including geometrical distortions, in HVS based watermarking algorithms. The perceptual model used here takes into account advanced features of the HVS identified from psychophysics experiments conducted in our laboratory. This model has been successfully applied in quality assessment and image coding schemes M. Carnec, P. Le Callet, D. Barba, An image quality assessment method based on perception of structural information, IEEE Internat. Conf. Image Process. 3 (2003) 185–188, N. Bekkat, A. Saadane, D. Barba, Masking effects in the quality assessment of coded images, in: SPIE Human Vision and Electronic Imaging V, 3959 (2000) 211–219. In this paper the human visual system model is used to create a perceptual mask in order to optimize the watermark strength. The optimal watermark obtained satisfies both invisibility and robustness requirements. Contrary to most watermarking schemes using advanced perceptual masks, in order to best thwart the de-synchronization problem induced by geometrical distortions, we propose here a Fourier domain embedding and detection technique optimizing the amplitude of the watermark. Finally, the robustness of the scheme obtained is assessed against all attacks provided by the Stirmark benchmark. This work proposes a new digital rights management technique using an advanced human visual system model that is able to resist various kind of attacks including many geometrical distortions.  相似文献   

20.
经正俊  齐刚 《电子科技》2020,33(8):21-27
针对水印中信息容量、不可见性和鲁棒性相互制约的问题,文中提出了一种基于QDCT和HVS的双彩色图像水印算法。该算法首先将彩色载体图像和彩色水印图像进行QDCT;然后根据HVS的特性决定水印信息的嵌入位置与嵌入强度,并结合广义Arnold变换和冗余嵌入策略, 将水印QDCT系数嵌入到载体图像QDCT系数的实部和虚部。实验结果表明,通过该算法嵌入水印后的彩色图像在PSNR为35 dB时,在常见攻击下提取出的水印大部分NC值高于0.95,水印信息具有更好的不可见性与鲁棒性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号